Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing
暂无分享,去创建一个
Jana Dittmann | Tom Neubert | Andrey Makrushin | Mario Hildebrandt | Christian Krätzer | J. Dittmann | T. Neubert | Christian Krätzer | M. Hildebrandt | A. Makrushin
[1] Darius Burschka,et al. Adaptive and Generic Corner Detection Based on the Accelerated Segment Test , 2010, ECCV.
[2] Christoph Busch,et al. Is your biometric system robust to morphing attaeks? , 2017, 2017 5th International Workshop on Biometrics and Forensics (IWBF).
[3] Roger Frost,et al. International Organization for Standardization (ISO) , 2004 .
[4] Mauro Barni,et al. Multiple parenting identification in image phylogeny , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[5] N. Kanopoulos,et al. Design of an image edge detection filter using the Sobel operator , 1988 .
[6] Kiran B. Raja,et al. On the vulnerability of face recognition systems towards morphed face attacks , 2017, 2017 5th International Workshop on Biometrics and Forensics (IWBF).
[7] Davide Maltoni,et al. On the Effects of Image Alterations on Face Recognition Accuracy , 2016, Face Recognition Across the Imaging Spectrum.
[8] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[9] Liping Sun,et al. A Survey of Passive Image Forensics , 2012 .
[10] Mauro Barni,et al. Multiple Parenting Phylogeny Relationships in Digital Images , 2016, IEEE Transactions on Information Forensics and Security.
[11] Davide Maltoni,et al. The magic passport , 2014, IEEE International Joint Conference on Biometrics.
[12] Gary R. Bradski,et al. ORB: An efficient alternative to SIFT or SURF , 2011, 2011 International Conference on Computer Vision.
[13] Christopher Hunt,et al. Notes on the OpenSURF Library , 2009 .
[14] Jana Dittmann,et al. Automatic Generation and Detection of Visually Faultless Facial Morphs , 2017, VISIGRAPP.
[15] Nasir D. Memon,et al. Image tamper detection based on demosaicing artifacts , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[16] Tom Drummond,et al. Fusing points and lines for high performance tracking , 2005, Tenth IEEE International Conference on Computer Vision (ICCV'05) Volume 1.
[17] Paul A. Viola,et al. Robust Real-Time Face Detection , 2001, International Journal of Computer Vision.
[18] Julian Fiérrez,et al. Between-Source Modelling for Likelihood Ratio Computation in Forensic Biometric Recognition , 2005, AVBPA.
[19] John F. Canny,et al. A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[20] Kiran B. Raja,et al. Detecting morphed face images , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[21] David G. Lowe,et al. Object recognition from local scale-invariant features , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.
[22] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[23] Jana Dittmann,et al. Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing steps , 2017, 2017 5th International Workshop on Biometrics and Forensics (IWBF).